Article Details

Scrape Timestamp (UTC): 2024-07-08 12:46:11.763

Source: https://www.theregister.com/2024/07/08/avast_secretly_gave_donex_ransomware/

Original Article Text

Click to Toggle View

Avast secretly gave DoNex ransomware decryptors to victims before crims vanished. Good riddance to another pesky tribe of miscreants. Researchers at Avast have provided decryptors to DoNex ransomware victims on the down-low since March after discovering a flaw in the crims' cryptography, the company confirmed today. They also published the decryptor for all to use now that the group appears to no longer present a serious threat in the cybersecurity landscape, after its dark web page was shut down in April. Delegates of Canada's Recon conference, most recently held at the end of June, were the first to hear of the news announced publicly today. Avast offered a brief explanation about how DoNex encrypts victims' data, but annoyingly didn't actually offer any insight into the flaw in its schema. "During the ransomware execution, an encryption key is generated by CryptGenRandom() function," Avast says in a blog post. "This key is then used to initialize ChaCha20 symmetric key and subsequently to encrypt files. After a file is encrypted, the symmetric file key is encrypted by RSA-4096 and appended to the end of the file. The files are picked by their extension, and file extensions are listed in the ransomware XML config. "For small files (up to 1 MB), the entire file is encrypted. For files with size greater than 1 MB, intermittent encryption is used – the file is split into blocks and those blocks are encrypted separately." That's all it was willing to share, however. El Reg pressed it for answers but the company didn't immediately respond to questions. The decryptor itself is available as a free download and Avast recommends victims run it as administrator, preferably while using the 64-bit version.  It says the password-cracking process is highly memory-intensive, but should only take about a second, so opt for the 64-bit version where possible. What's DoNex ransomware? DoNex isn't the most recognizable name in ransomware, but it has been around for a while under various guises. Avast reckons it started off in April 2022 under the name "Muse" before rebranding in November of that year to a fake version of LockBit 3.0.  The genuine version was launched by Dmitry Khoroshev's gang in June 2022 but the builder was leaked months later in September, rumored to be the work of a disgruntled LockBit member, and DoNex's imitation was one of many that spun up as a result. The ransom note of the fake version bore many similarities to the genuine article, with a few changes such as the contact address – victims weren't actually dealing with LockBit after all. In May 2023, another rebrand was carried out, this time to what appeared to be a brand-new operation called DarkRace, claiming several victims mainly based in Italy, Malwarebytes said last year. A Broadcom advisory also published last year said its payload was similar to that of LockBit 3.0, so it seems like very little effort was spent on developing a novel strain throughout its lifecycle. Avast said DoNex was the final rebrand, which took place in March this year and was the most short-lived of the lot, lasting around just a single month. Again, it targeted victims in locations including Italy, the US, Belgium, Netherlands, and – a ransomware rarity – Russia. The ransom note was almost a verbatim copy of DarkRace's, once again suggesting the crims behind it didn't pull any muscles in trying to bring something novel to the table – probably just trying to make a quick buck with as little effort as possible.

Daily Brief Summary

MALWARE // Avast Provides Stealthy Decryption Aid to DoNex Ransomware Victims

Avast covertly supplied decryptors to DoNex ransomware victims since March after identifying flaws in the group's encryption method.

The cybersecurity company made the decryptor publicly available after confirming that DoNex is no longer a significant threat, following the shutdown of its dark web operations in April.

The announcement was formally made at Canada's Recon conference, highlighting Avast's findings and the availability of the free decryption tool.

Avast criticized for not disclosing specific details about the cryptographic flaw exploited in DoNex's ransomware, limiting shared technical insights.

DoNex ransomware has undergone several rebrands since its inception in April 2022, with the most recent being in March 2023, indicating its short lifespan and low development effort.

Avast's decryptor is designed for user-friendly operation, requiring administrative privileges and a recommendation for using a 63-bit system for efficiency.

DoNex targeted various countries, including Italy, the US, Belgium, the Netherlands, and uncommonly, Russia, with a ransom note similar to previous incarnations.